Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

polkit-default-privs-13.2+20201209.96f7b21-1.27 RPM for noarch

From OpenSuSE Leap 15.3 for noarch

Name: polkit-default-privs Distribution: SUSE Linux Enterprise 15
Version: 13.2+20201209.96f7b21 Vendor: SUSE LLC <https://www.suse.com/>
Release: 1.27 Build date: Sat Mar 6 00:38:34 2021
Group: Productivity/Security Build host: sheep25
Size: 177935 Source RPM: polkit-default-privs-13.2+20201209.96f7b21-1.27.src.rpm
Packager: https://www.suse.com/
Url: http://github.com/openSUSE/polkit-default-privs.git
Summary: SUSE PolicyKit default permissions
Predefined polkit profiles for different usage scenarios like desktop and
server. These profiles define the kind of authentication required for various
polkit actions used across applications.


Authors:
--------
    Ludwig Nussel

Provides

Requires

License

GPL-2.0-or-later

Changelog

* Wed Dec 09 2020 matthias.gerstner@suse.com
  - Update to version 13.2+20201209.96f7b21:
    * libvirt: allow the active session to create read-only connections (bsc#1179126)
* Tue Sep 29 2020 jsegitz@suse.com
  - Update to version 13.2+20200929.fb820eb:
    * systemd networkd incremental polkit rules (bsc#1161328)
    * whitelist chvt action in logind (bsc#1167542)
* Mon Sep 28 2020 jsegitz@suse.com
  - Update to version 13.2+20200928.bfceddc:
    * whitelist org.freedesktop.network1.forcerenew (bsc#1176215)
* Tue Apr 21 2020 matthias.gerstner@suse.com
  - Update to version 13.2+20200421.207b724:
    * packagekit: allow system-sources-refresh w/o password entry (bsc#1169540)
* Thu Nov 28 2019 malte.kraus@suse.com
  - Update to version 13.2+20191128.c2eb3f7:
    * fix ModemManager1.Time whitelisting (bsc#1156961)
* Fri Nov 22 2019 malte.kraus@suse.com
  - Update to version 13.2+20191122.eb9cc80:
    * whitelist org.freedesktop.ModemManager1.Modem.Time (bsc#1156961)
    * kcm_sddm: incremental addition of new rules (bsc#1145182)
* Mon Oct 21 2019 jsegitz@suse.com
  - Update to version 13.2+20191015.280c25b:
    * gnome-initial-session: whitelist polkit rules in
      20-gnome-initial-setup.rules (bsc#1125432)
    * Networkd rules whitelisted for package "sytemd-network"
* Thu Sep 05 2019 malte.kraus@suse.com
  - Update to version 13.2+20190905.0016c47:
    * whitelist new systemd-resolved actions (bnc#1149216)
* Tue Aug 27 2019 malte.kraus@suse.com
  - Update to version 13.2+20190827.0cc2a82:
    * make new systemd rules more restrictive (boo#1146300,
      boo#1145639)
* Fri Aug 23 2019 lnussel@suse.de
  - Update to version 13.2+20190823.a5f89c3:
    * systemd-networkd (boo#1146300)
    * systemd-portabled (boo#1145639)
* Tue Aug 06 2019 jsegitz@suse.de
  - Update to version 13.2+20190806.841a06b:
    * libvirt polkit actions: Additional no:no:no action (bsc#1144077)
* Thu Aug 01 2019 matthias.gerstner@suse.com
  - Update to version 13.2+20190801.f0c6234:
    * calamares: whitelist pkexec run as root in X11 action
    * mousepad: whitelisting of pkexec action (bsc#1143216)
* Thu Jul 11 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190711.953db4f:
    * libvirt: add a couple of additional polkit actions (bsc#1140151)
* Thu Jul 04 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190704.dfb36ad:
    * libvirt rules: fix whitelisting (bsc#1125314)
* Wed Jul 03 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190703.9a076dc:
    * libvirt polkit actions: whitelisting of incremental no:no:no actions (bsc#1140151)
    * backintime-qt: removal of old rule name (bsc#1133680)
* Mon May 27 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190527.64d9813:
    * polkit-rules-whitelist.json: fix syntax error
* Thu May 23 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190523.efe368f:
    * polkit profiles: whitelist lightdm-gtk-greeter-settings (bsc#1135695)
* Mon May 20 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190520.a67a2af:
    * polkit rules: whitelist libvirt (bsc#1125314)
    * rules for systemd org.freedesktop.login1.set-reboot* (bsc#1133843)
* Tue May 07 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190507.75c6d67:
    * fwupd: add one more follow-up rules for bsc#1133082
* Fri May 03 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190503.00651e7:
    * tuned: add new plugin doc actions (bsc#1131858)
* Thu May 02 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190502.37ad64c:
    * fwupd: add incrementally added polkit actions (bsc#1133082)
* Tue Apr 30 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190430.a4836d6:
    * backintime: add renamed gui pkexec action (bsc#1133680)
    * backintime: add restrictive config, too
* Thu Apr 11 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190411.5775d58:
    * gamemode: additional polkit action for gpuclockctl (bsc#1129967)
    * NetworkManager: remove wrongly named wifi-scan rule (bsc#1128560)
* Fri Mar 15 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190315.3da47ba:
    * rules.d whitelist: add systemd-network (bsc#1125438) and flatpak entries (bsc#984817)
* Fri Mar 15 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190315.b904805:
    * polkit privs whitelisting: add renamed wifi-scan -> wifi.scan action (bsc#1128560)
* Wed Mar 06 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190306.b56445c:
    * whitelisting: systemd org.freedesktop.hostname1.get-product-uuid
* Tue Feb 26 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190226.f884108:
    * polkit-rules-whitelist: adjust format to better support follow-up audits
      (bsc#1125314)
* Mon Feb 25 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190225.0ef150d:
    * relax change-own-user-data action in the restrictive profile (bsc#1125110)
* Wed Feb 13 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190213.2f39f9b:
    * add whitelisting file for files installed in polkit-1/rules.d * (bsc#1125314)
    * the new whitelisting is packaged in a separate subpackage, because it is
      not needed for normal operation, only during OBS build time for rpmlint to
      find it.
* Thu Feb 07 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190207.4d86620:
    * add manage-vdo privilege of udisks2 (bsc#1123747)
    * further improve documentation in /etc/polkit-default-privs.local
    * sort the output rules in /etc/polkit-1/rules.d/90-default-privs to
      make the runs reproducible. (https://github.com/openSUSE/polkit-default-privs/issues/3)
* Wed Feb 06 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190207.9bb8655:
    * man pages: extend documentation to better describe syntax and profiles
    * install README.md as part of package documentation
    * set_polkit_default_privs: add warning about unknown profiles
    * introduce a new polkit-default-privs easy profile
* Wed Jan 30 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190130.b2262b2:
    * Whitelist additional Flatpak action metadata-update (bsc#1123653)
    * soften authentication requirements for flatpak's appstream-update (bsc#1122116)
* Mon Jan 28 2019 opensuse-packaging@opensuse.org
  - whitelist newly introduced network manager wifi-scan action (bsc#1122262)
* Fri Jan 25 2019 bjorn.lie@gmail.com
  - Be explicit in service file about master branch is the one in use
    for tarball generation via revision parameter.
* Mon Jan 14 2019 matthias.gerstner@suse.com
  - introduce service file for pulling new releases from git upstream instead of
    using the old mkchanges script from the git repo (bsc#1121841). This changes
    the version number of the package but nothing else.
* Thu Jan 03 2019 matthias.gerstner@suse.com
  - luckybackup: initial whitelisting of polkit pkexec action (bsc#1120403)
* Fri Dec 21 2018 matthias.gerstner@suse.com
  - boltd: initial whitelisting of polkit actions (bsc#1119975)
* Tue Dec 11 2018 matthias.gerstner@suse.com
  - tuned: add new logging actions (bsc#1118117)
* Tue Nov 27 2018 matthias.gerstner@suse.com
  - chkstat: adjust DO NOT EDIT banner in generated rules file (bsc#1099754)
* Thu Nov 15 2018 matthias.gerstner@suse.com
  - spice-gtk: relax lowlevelusbaccess requirements (bsc#1083025). Users already
    need to be in the kvm group to access the setuid binary anyways.
* Thu Nov 15 2018 matthias.gerstner@suse.com
  - blueman: relax standard profile rules, drop unneeded bluez.config rule (bsc#1083066)
* Wed Sep 05 2018 matthias.gerstner@suse.com
  - polkit-default-privs: add renamed libvirt rules (bsc#1106813)
* Thu Aug 09 2018 matthias.gerstner@suse.com
  - polkit-default-privs: add meson install action (bsc#1103811)
* Wed Aug 08 2018 matthias.gerstner@suse.com
  - polkit-default-privs: fix syntax error in gamemode whitelisting (bsc#1104135)
* Mon Jul 30 2018 matthias.gerstner@suse.com
  - polkit-default-privs: whitelist gamemode pkexec action (bsc#1093979)
* Fri Jul 27 2018 matthias.gerstner@suse.com
  - polkit-default-privs: fix switchboard-plug* whitelisting. An error slipped
    in that causes `set_polkit_default_privs` to print an error message.
* Fri Jul 06 2018 matthias.gerstner@suse.com
  - polkit-default-privs: whitelist incremental libvirt actions (bnc#1100328)
  - polkit-default-privs: group together the large blocks of libvirt rules
* Thu Jul 05 2018 matthias.gerstner@suse.com
  - polkit-default-privs: whitelist switchboard-plug-* (bsc#1088472)
* Fri Jun 22 2018 matthias.gerstner@suse.com
  - polkit-default-privs: add cinnamon-control-center datetime action (bnc#1090371)
* Thu Jun 21 2018 matthias.gerstner@suse.com
  - polkit-default-privs: add lightdm rules (bnc#1089436)
* Wed Jun 13 2018 matthias.gerstner@suse.com
  - polkit-default-privs: added liblxqt backlight action (bnc#1092192)
* Tue Jun 12 2018 matthias.gerstner@suse.com
  - polkit-default-privs: whitelisting new resolve1 action of systemd (bnc#1096907)
  - polkit-default-privs: harmonized systemd comments a bit
* Thu Jun 07 2018 matthias.gerstner@suse.com
  - polkit-default-privs: new action change-own-password for accountsservice (bnc#1088780)
* Tue Apr 24 2018 matthias.gerstner@suse.com
  - polkit-default-privs: whitelisting renamed kalarm polkit actions (bnc#1087714)
* Wed Apr 11 2018 matthias.gerstner@suse.com
  - polkit-default-privs: additional tuned rules (bnc#1088648)
* Wed Mar 28 2018 matthias.gerstner@suse.com
  - polkit-default-privs: some more amnesty whitelisting of untracked
    privileges. Two more packages are affected:
    - bleachbit (bsc#1087326)
    - systemd, systemd-mini (bsc#1087328)
* Mon Mar 12 2018 matthias.gerstner@suse.com
  - polkit-default-privs: mass amnesty whitelisting of untracked privileges. See
    https://lists.opensuse.org/opensuse-factory/2018-02/msg01044.html for
    rationale. This allows existing packages in Factory to continue building
    after the tighter rpmlint-Factory checks become effective. Following
    packages are affected:
    - blueman (bsc#1083066)
    - cinnamon settings-daemon (bnc#1083067)
    - connman (bsc#1083069)
    - flatpak (bsc#984817)
    - fwupd (bsc#1083022)
    - gsmartcontrol (bsc#1084693)
    - gvfs (bsc#1073214)
    - laptop-mode-tools (bsc#1084695)
    - mate-system-monitor (bsc#1084701)
    - nemo (bsc#1084702)
    - nemo-extensions (bsc#1084703)
    - PackageKit (bnc#993505)
    - pantheon-files (bsc#1084704)
    - scap-workbench (bsc#1084706)
    - spice-gtk (bsc#1083025)
    - sysprof (bsc#1083055)
* Wed Jan 31 2018 krahmer@suse.com
  - polkit-default-privs: adding more NM actions (bsc#1077504)
* Wed Jan 17 2018 krahmer@suse.com
  - polkit-default-privs: adding new udisks2 rules (bsc#1073216)
* Mon Dec 18 2017 matthias.gerstner@suse.com
  - polkit-default-privs: added connectivity-check for NetworkManager (bnc#1072702)
* Wed Nov 29 2017 krahmer@suse.com
  - polkit-default-privs: adding new sddm kcm actions (bsc#1065563)
* Fri Nov 24 2017 matthias.gerstner@suse.com
  - Fixed usage of %_fillupdir macro, needs to be passed to `make install` such
    that the file is installed into the right location.
* Thu Nov 23 2017 rbrown@suse.com
  - Replace references to /var/adm/fillup-templates with new
    %_fillupdir macro (boo#1069468)
* Wed Oct 25 2017 krahmer@suse.com
  - polkit-default-privs: adding flatpak (bsc#1064011)
  - polkit-default-privs: adding connman (bsc#1057697)
* Wed Oct 11 2017 krahmer@suse.com
  - polkit-default-privs: adding deja-dup (bsc#1058935)
* Wed Sep 06 2017 krahmer@suse.com
  - polkit-default-privs: adding fwupd (bsc#932807)
* Wed Aug 23 2017 krahmer@suse.com
  - adding more flatpak rules (bsc#1012961)
* Fri Jul 21 2017 matthias.gerstner@suse.com
  - Added new tuned method verify_profile_ignore_missing (bnc#1048961)
* Wed Jul 19 2017 krahmer@suse.com
  - polkit-default-privs: adding new realmd action (bsc#1048025)
* Mon Jul 03 2017 krahmer@suse.com
  - polkit-default-privs: adjusting brltty (bsc#967436)
* Tue Jun 20 2017 krahmer@suse.com
  - relaxing action "org.opensuse.cupspkhelper.mechanism.job-edit" (bsc#827331)
* Fri Apr 28 2017 matthias.gerstner@suse.com
  - added polkit rules for backintime (bnc#1007723, bnc#1032717)
  - relaxing powerdevil rules (bsc#1026038)
* Tue Apr 11 2017 matthias.gerstner@suse.com
  - added polkit rules for renamed kcmwallet -> kcmwallet5 (bsc#1033296)
* Tue Apr 11 2017 matthias.gerstner@suse.com
  - added polkit rules for tuned (bsc#1007279)
* Mon Feb 06 2017 krahmer@suse.com
  - polkit-default-privs: adding blueman actions (bsc#987141)
* Mon Jan 30 2017 krahmer@suse.com
  - adding kde powerdevil gpu helper (bsc#1019644)
* Tue Dec 06 2016 krahmer@suse.com
  - adding org.freedesktop.login1.set-self-linger (bsc#1009468)
* Tue Oct 11 2016 meissner@suse.com
  - add flatpak privileges, but currently auth_admin currently (bsc#984817)
* Mon Sep 12 2016 krahmer@suse.com
  - polkit-default-privs: cleanups as per discussion with Ludwig
  - polkit-default-privs: adding rules for sysprof (bsc#996111) and networkmanager (bsc#996110)
* Mon Jun 13 2016 krahmer@suse.com
  - polkit-default-privs: adding ModemManager (bsc#976945)
* Wed Apr 13 2016 krahmer@suse.com
  - added brltty (bsc#967436)
* Mon Apr 11 2016 meissner@suse.com
  - add importd privs as default tracked (bsc#964935)
* Tue Mar 22 2016 krahmer@suse.com
  - polkit-default-privs: relaxing firewalld polkit rule for desktop (bsc#971580)
* Tue Jan 05 2016 krahmer@suse.com
  - polkit-default-privs: adding libvirt action ids (bsc#959297)
* Tue Dec 01 2015 krahmer@suse.com
  - polkit-default-privs: Adding new systemd actions (bsc#955626)
  - polkit-default-privs: create files with consistent permissions
* Mon Nov 09 2015 krahmer@suse.com
  - polkit-default-privs: adding rules for cinnamon settings-daemon (bsc#951830)
  - polkit-default-privs: relaxing some ModemManager rules to avoid typing password after screenlock/hibernate (bsc#948728)
* Tue Jun 23 2015 krahmer@suse.com
  - polkit-default-privs: PackageKit (bnc#929212)
* Mon Jun 08 2015 krahmer@suse.com
  - polkit-default-privs: adding netvisix rules (bsc#930195)
* Fri May 22 2015 meissner@suse.com
  - instead of auth-admin, disallow colord management for inactive and
    other users, so they do not get root password popups bsc#918594
* Wed Apr 22 2015 krahmer@suse.com
  - polkit-default-privs: adding gnome-control-center actions (bnc#927508)
      adding realmd actions (bnc#916767)
* Mon Apr 20 2015 krahmer@suse.com
  - polkit-default-privs: rename of powerdevil action-names (bnc#927275)
* Wed Apr 08 2015 krahmer@suse.com
  - polkit-default-privs: add urfkill (bnc#926288) polkit action
* Tue Apr 07 2015 krahmer@suse.com
  - polkit-default-privs: added gnome-multi-writer actions (bnc#924062)
* Wed Feb 11 2015 krahmer@suse.com
  - adding storaged rules (bnc#915770)
* Wed Jan 14 2015 krahmer@suse.com
  - adding KDE5 powerdevil rules (bnc#912121)
* Wed Dec 10 2014 krahmer@suse.com
  - added firewalld (bnc#907625) polkit actions
* Fri Nov 28 2014 krahmer@suse.com
  - polkit-default-privs: adding _keep to ModemManager rules (bnc#900813)
* Fri Nov 07 2014 meissner@suse.com
  - Add org.kde.kcontrol.kcmsddm.save (bsc#904313)
* Mon Nov 03 2014 krahmer@suse.com
  - polkit-default-privs: relaxing pcsc rules (bsc#864178)

Files

/etc/polkit-1/rules.d/90-default-privs.rules
/etc/polkit-default-privs.easy
/etc/polkit-default-privs.local
/etc/polkit-default-privs.restrictive
/etc/polkit-default-privs.standard
/sbin/chkstat-polkit
/sbin/set_polkit_default_privs
/usr/share/doc/packages/polkit-default-privs
/usr/share/doc/packages/polkit-default-privs/README.md
/usr/share/fillup-templates/sysconfig.security-polkit_default_privs
/usr/share/man/man5/polkit-default-privs.5.gz
/usr/share/man/man8/set_polkit_default_privs.8.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Apr 9 14:50:04 2024